Announcing new capabilities in MS Azure Firewall
Credit to: 'Yair Tor' Principal Program Manager, Azure Networking

Announcing new capabilities in MS Azure Firewall

Azure Firewall is a cloud native firewall-as-a-service offering which enables customers to centrally govern all their traffic flows using a DevOps approach. The service supports both application (such as *.github.com), and network level filtering rules. It is highly available and auto scales as your traffic grows.

Yesterdays saw the launch two new key capabilities to Azure Firewall.

  • Threat intelligence based filtering
  • Service tags filtering

Threat intelligence based filtering (preview)

Microsoft has a rich signal of both internal threat intelligence data, as well as third party sourced data. Our vast team of data scientists and cybersecurity experts are constantly mining this data to create a high confidence list of known malicious IP addresses and domains. Azure firewall can now be configured to alert and deny traffic to and from known malicious IP addresses and domains in near real-time. The IP addresses and domains are sourced from the Microsoft Threat Intelligence feed. The Microsoft Intelligent Security Graph powers Microsoft Threat Intelligence and provides security in multiple Microsoft products and services, including Azure Security Center and Azure Sentinel.

Threat intelligence-based filtering is default-enabled in alert mode for all Azure Firewall deployments, providing logging of all matching indicators. Customers can adjust behavior to alert and deny.

Figure 1 – Azure Firewall concept architecture


Managing your firewall

Logging analysis of threat data and actionable insights are all crucial and central themes to planning, building, and operating applications and infrastructure.

Azure Firewall provides full integration with Azure Monitor. Logs can be sent to Log Analytics, Storage, and Event Hubs.  Azure Log Analytics allows for the creation of rich dashboards and visualization. Along with custom data queries this powerful integration provides a common place for all your logging needs, with vast options to customize the way you consume your data. Customers can send data from Azure Monitor to SIEM systems such as Splunk, ArcSight and similar third party offerings.


Figure 2 – Azure Firewall detecting a compromised VM using threat intelligence and blocking these outbound connections


Figure 3 – Azure Firewall detecting port scan attempts using threat intelligence and blocking these inbound connections

Service tags filtering

Along with threat intelligent-based filtering, we are adding support for service tags which have also been a highly requested feature by our users. A service tag represents a group of IP address prefixes for specific Microsoft services such as SQL Azure, Azure Key Vault, and Azure Service Bus, to simplify network rule creation. Microsoft today supports service tagging for a rich set of Azure services which includes managing the address prefixes encompassed by the service tag, and automatically updating the service tag as addresses change. Azure Firewall service tags can be used in the network rules destination field. We will continue to add support for additional service tags over time.

Central management

Azure Firewall public REST APIs can be used by third party security policy management tools to provide a centralized management experience for Azure Firewalls, Network Security Groups, and network virtual appliances (NVAs). Since September 2018, the private preview for Barracuda’s new service, AlgoSec CloudFlow and Tufin.


要查看或添加评论,请登录

Edwin R.的更多文章

  • Dubai archaic rental process - A dif.rent digital transformation opportunity

    Dubai archaic rental process - A dif.rent digital transformation opportunity

    Dubai is deemed as the land of opportunity attracting large numbers of expats looking to live and work in this desert…

  • Long term property rentals - The Problem - A disconnected market that introduces friction at every step.

    Long term property rentals - The Problem - A disconnected market that introduces friction at every step.

    The market size of private 'long-term' rental property contracts in the United Kingdom alone was estimated at greater…

    11 条评论
  • Core Design Principles

    Core Design Principles

    The Dif.rent server architecture has been defined to provide full featured, open standards based, in-memory cloud…

  • Why We Are Dif.rent

    Why We Are Dif.rent

    Home rental made Easy The Market — The Why. “To solve a pain, you need to define the problem, to define the problem you…

  • Being Different

    Being Different

    "The one who follows the crowd will usually go no further than the crowd.But those who walk alone are likely to find…

    8 条评论
  • Azure CI/CD Pipeline

    Azure CI/CD Pipeline

    Azure Web Apps is a fast and simple way to create web apps using ASP.NET, Java, Node.

  • Microsoft Azure: Function Apps Performance Considerations

    Microsoft Azure: Function Apps Performance Considerations

    Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its…

    1 条评论
  • Setting up Python3 and MS Azure CLI on your MacOS

    Setting up Python3 and MS Azure CLI on your MacOS

    Introduction Getting started with MS Azure cloud based projects as a solutions architect there are numerous tools…

  • Kony' Reference Architecture? What is it?

    Kony' Reference Architecture? What is it?

    The term “Reference Architecture”, within the Information Technology community, has various meanings, multiple purposes…

  • What is React Native & Redux

    What is React Native & Redux

    Adopting React Native & Redux instead of MVC During early project planning phase for any mobile application one of the…

社区洞察

其他会员也浏览了